Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Configuration IPSec on version 2.3.2

    Scheduled Pinned Locked Moved IPsec
    1 Posts 1 Posters 940 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      struppi
      last edited by

      Hello,

      after upgrade from version 2.1.5 to 2.3.2 the Mobile IPSec with NCP VPN Client on Andorid and shrewsoft on Windows didn't work anymore :'(
      Had anyone an description howto configure this or an configuration who ist working, so that IPSec is working again as in 2.1.5?

      This is the current Logfile:

      Nov 25 09:45:26  charon      05[ENC] <7> received unknown vendor ID: cb:e7:94:44:a0:87:0d:e4:22:4a:2c:15:1f:bf:e0:99
      Nov 25 09:45:26  charon      05[ENC] <7> received unknown vendor ID: c6:1b:ac:a1:f1:a6:0c:c1:08:00:00:00:00:00:00:00
      Nov 25 09:45:26  charon      05[IKE] <7> received FRAGMENTATION vendor ID
      Nov 25 09:45:26  charon      05[IKE] <7> received Cisco Unity vendor ID
      Nov 25 09:45:26  charon      05[IKE] <7> xxx.xx.1.108 is initiating a Aggressive Mode IKE_SA
      Nov 25 09:45:26  charon      05[CFG] <7> looking for pre-shared key peer configs matching xx.xxx.27.15…xxx.xx.1.108[test@test.de]
      Nov 25 09:45:26  charon      05[CFG] <7> selected peer config "con1"
      Nov 25 09:45:26  charon      05[IKE] <con1|7>no shared key found for 'xx.xxx.27.15'[xx.xxx.27.15] - 'test@test.de'[xxx.xx.1.108]
      Nov 25 09:45:26  charon      05[ENC] <con1|7>generating INFORMATIONAL_V1 request 1881593601 [ N(INVAL_KE) ]
      Nov 25 09:45:26  charon      05[NET] <con1|7>sending packet: from xx.xxx.27.15[500] to xxx.xx.1.108[44436] (56 bytes)
      Nov 25 09:45:30  charon      05[NET] <8> received packet: from xxx.xx.1.108[44436] to xx.xxx.27.15[500] (948 bytes)
      Nov 25 09:45:30  charon      05[ENC] <8> parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V ]
      Nov 25 09:45:30  charon      05[ENC] <8> received unknown vendor ID: da:8e:93:78:80:01:00:00
      Nov 25 09:45:30  charon      05[IKE] <8> received XAuth vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> received NAT-T (RFC 3947) vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> received DPD vendor ID
      Nov 25 09:45:30  charon      05[ENC] <8> received unknown vendor ID: eb:4c:1b:78:8a:fd:4a:9c:b7:73:0a:68:d5:6d:08:8b
      Nov 25 09:45:30  charon      05[ENC] <8> received unknown vendor ID: cb:e7:94:44:a0:87:0d:e4:22:4a:2c:15:1f:bf:e0:99
      Nov 25 09:45:30  charon      05[ENC] <8> received unknown vendor ID: c6:1b:ac:a1:f1:a6:0c:c1:08:00:00:00:00:00:00:00
      Nov 25 09:45:30  charon      05[IKE] <8> received FRAGMENTATION vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> received Cisco Unity vendor ID
      Nov 25 09:45:30  charon      05[IKE] <8> xxx.xx.1.108 is initiating a Aggressive Mode IKE_SA
      Nov 25 09:45:30  charon      05[CFG] <8> looking for pre-shared key peer configs matching xx.xxx.27.15…xxx.xx.1.108[test@test.de]
      Nov 25 09:45:30  charon      05[CFG] <8> selected peer config "con1"
      Nov 25 09:45:30  charon      05[IKE] <con1|8>no shared key found for 'xx.xxx.27.15'[xx.xxx.27.15] - 'test@test.de'[xxx.xx.1.108]
      Nov 25 09:45:30  charon      05[ENC] <con1|8>generating INFORMATIONAL_V1 request 2308373839 [ N(INVAL_KE) ]
      Nov 25 09:45:30  charon      05[NET] <con1|8>sending packet: from xx.xxx.27.15[500] to xxx.xx.1.108[44436] (56 bytes)
      Nov 25 09:46:24  charon      12[CFG] rereading secrets
      Nov 25 09:46:24  charon      12[CFG] loading secrets from '/var/etc/ipsec/ipsec.secrets'
      Nov 25 09:46:24  charon      12[CFG] loaded IKE secret for test@test.de
      Nov 25 09:46:24  charon      12[CFG] rereading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
      Nov 25 09:46:24  charon      12[CFG] rereading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
      Nov 25 09:46:24  charon      12[CFG] rereading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'
      Nov 25 09:46:24  charon      12[CFG] rereading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
      Nov 25 09:46:24  charon      12[CFG] rereading crls from '/usr/local/etc/ipsec.d/crls'
      Nov 25 09:46:24  charon      12[CFG] received stroke: unroute 'bypasslan'
      Nov 25 09:46:24  ipsec_starter  5316  shunt policy 'bypasslan' uninstalled
      Nov 25 09:46:24  charon      13[CFG] received stroke: delete connection 'bypasslan'
      Nov 25 09:46:24  charon      13[CFG] deleted connection 'bypasslan'
      Nov 25 09:46:24  charon      09[CFG] received stroke: delete connection 'con1'
      Nov 25 09:46:24  charon      09[CFG] deleted connection 'con1'
      Nov 25 09:46:24  charon      13[CFG] received stroke: add connection 'bypasslan'
      Nov 25 09:46:24  charon      13[CFG] added configuration 'bypasslan'
      Nov 25 09:46:24  charon      08[CFG] received stroke: route 'bypasslan'
      Nov 25 09:46:24  ipsec_starter  5316  'bypasslan' shunt PASS policy installed
      Nov 25 09:46:24  charon      14[CFG] received stroke: add connection 'con1'
      Nov 25 09:46:24  charon      14[CFG] added configuration 'con1'

      Thanks</con1|8></con1|8></con1|8></con1|7></con1|7></con1|7>

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.